[DISCUSSION] 0patch

Discussion in 'Application Software' started by acer-5100, Oct 15, 2022.

  1. CyberMSX

    CyberMSX MDL Novice

    Feb 23, 2020
    4
    0
    0
    When Microsoft announced the end-of-support for Windows 7 and Windows Server 2008 R2 more than two years ago, the company offered its Extended Security Updates (ESU) program. ESU allowed organizations that were still running the aforementioned OSs to receive important security updates to help them stay safe from cyberthreats.

    While Microsoft will provide the final batch of security updates for Windows 7 in January 2023, a platform called 0patch aims to to take Microsoft's place in keeping the old operating systems protected against cyberthreats. 0patch announced this week that it will provide its micropatching service until January 2025 for Windows 7, as well as Windows Server 2008 R2 devices (via Techspot).

    "We have decided to keep providing security patches for Windows 7 and Windows Server 2008 R2 for critical vulnerabilities that are likely to get exploited, and will be happy to keep you secured for a fraction of what you had paid for ESU so far," 0patch's blog stated.

    0patch's micropatches are applied directly in the memory of running processes instead of changing your executable files, so a user doesn't need to restart their computer to finish installing the updates.

    If a user is under Microsoft's ESU program and wants to continue receiving security updates with 0patch, they only need to apply all remaining ESU updates. Then, they need to install the 0patch "Free Agent" on their Windows 7 or Server 2008 R2 computers and register them to their 0patch account.

    Via NeoWin
     
  2. acer-5100

    acer-5100 MDL Guru

    Dec 8, 2018
    3,752
    2,676
    120
    Wow a another great and detailed technical analysis from you.

    Is recycling the personal opinion of a user that can't respond the best you can do?
     
  3. Mr.X

    Mr.X MDL Guru

    Jul 14, 2013
    8,575
    15,646
    270
  4. FroggieTheGremlin

    FroggieTheGremlin MDL Member

    Aug 25, 2015
    117
    98
    10
    That problem seems to belong to both of us (see Post #6719... 101 posts ago:D)
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  5. dziugas1959

    dziugas1959 MDL Novice

    Oct 11, 2017
    17
    7
    0
    Yeah the problem is, that it is a running in memory type protection, rather than OTA/SWU like „Windows update“ does it. Meaning it is running in memory, using resources, and if an exploit using before memory exclusion runs then it's really meaningless.